CYBER SECURITY ANALYST SKILLS, EXPERIENCE, AND JOB REQUIREMENTS

Published: May 27, 2025 - The Cyber Security Analyst experience in investigating cyber threats using vendor reputational software such as BitSight, RiskRecon, and Security Scorecard, with strong networking and cloud expertise. This position requires skills in analyzing logs for anomalous activities, identifying threat actor tactics, and applying frameworks like the Diamond Threat Model and Cyber Kill Chain. This role requires adeptness in communicating complex security concepts clearly, with deep knowledge of cloud security, malware analysis, cyber threat intelligence, network security technologies, and security engineering principles.

Essential Hard and Soft Skills for a Standout Cyber Security Analyst Resume
  • Report Generation
  • Invoice Processing
  • Bank Reconciliation
  • Account Reconciliation
  • Ledger Maintenance
  • Payment Processing
  • Receipt Issuing
  • Cash Handling
  • Register Entry
  • Refund Procedures
  • Quick Learning
  • Team Collaboration
  • Active Listening
  • Service Orientation
  • Conflict Resolution
  • Complaint Resolution
  • Adaptability Openness
  • Task Initiative
  • Policy Compliance
  • Customer Service

Summary of Cyber Security Analyst Knowledge and Qualifications on Resume

1. BS in Cybersecurity with 3 years of Experience

  • Solid knowledge and understanding of information technology systems and processes
  • Sound understanding of the OSI networking model
  • Knowledge of IP networking protocols
  • Experience with Windows Server/Workstation and Mac OS
  • Proven analytical, problem-solving solving and troubleshooting skills
  • Knowledge of information security principles and practice
  • Experience with antivirus, anti-malware and proxy solutions
  • Experience in security incident response
  • Ability to learn and apply new concepts quickly
  • Strong written and oral communication skills
  • Comfortable with interfacing with other internal or external organizations regarding security policy and standards violations, security controls failures and incident response situations
  • Ability to balance and prioritize work
  • Experience using log analysis tools
  • Experience with Unix, Linux
  • Computer programming and scripting languages (Python, C++, Perl, etc.)
  • Experience analyzing firewall access control lists

2. BS in Computer Science with 5 years of Experience

  • Demonstrable knowledge of networking (TCP/IP, topology, and security), operating systems (Windows/UNIX), and web technologies (Internet security).
  • Understand system data, including security event logs, system logs, and firewall logs.
  • Excellent written and verbal communication skills, able to communicate technical details clearly and concisely with peers and all levels of management.
  • The capability to think and operate independently or in a team environment with minimal supervision.
  • Strong background in process and procedure with the ability to develop, revise and execute standard work.
  • Organizational skills to manage multiple competing priorities and deadlines in a fast-paced working environment.
  • Proven ability to troubleshoot and solve technical issues.
  • Network analysis using tcpdump, Wireshark or other packet capture/inspection tools.
  • Experience in searching, interpreting and working with data from enterprise logging systems including syslog, netflow, Splunk or other SIEM/SIEM platforms.
  • Familiar with security-related frameworks including CIS20, NIST and PCI
  • Experience with Incident Management programs
  • Experience in intrusion detection and analysis
  • Knowledge of SPLUNK, Nessus, email gateway, O365, and Palo Alto technologies

3. BS in Information Technology with 2 years of Experience

  • Experience in supporting incident response and/or investigations
  • Experience with Vendor reputational software (BitSight, RiskRecon, Security Scorecard, etc..)
  • Strong Networking and/or Cloud Experience
  • Experience reviewing and assessing logs for anomalous activity indicating the presence of a threat
  • Knowledge and ability to identify threat actor attack methods and track developments
  • Experience using the Diamond Threat Model or Cyber Kill Chain
  • Extensive experience conveying complex information in simple, succinct explanations
  • Understanding and familiarity with cloud security and concepts or knowledge of static and/or dynamic malware analysis
  • Experience in Cyber Threat Intelligence
  • Experience in Intelligence and/or Counterintelligence
  • Experience conducting threat modeling
  • Understanding and familiarity with the intelligence cycle
  • Comprehension of network security and related technologies including intrusion detection and prevention, WAF, NGFW, DMZ design, and network segmentation
  • Strong communication skills, especially with diverse audiences
  • Technical knowledge in security engineering, system and network security, authentication and security protocols, cryptography, and application security

4. BS in Network Security with 4 years of Experience

  • Strong interpersonal and security skills
  • Good communication skills and customer-centric focus
  • Clearly and in a timely manner with all customers, partners and users, internal and external
  • Ability to collaborate and cooperate with members of the team and members of other teams
  • Understanding of 24x7 mission-critical enterprise computing environments and the impact of service disruption on a company’s bottom line
  • Ability to proactively learn new technology, processes and other skills
  • Able to proactively search for solutions from knowledge bases, support, documentation and other information.
  • Keen interest in continual learning and professional development
  • Time management skills and ability to multi-task and prioritize assigned tasks, problems and requests in a high-pressure environment
  • Good knowledge of IT Operations, infrastructure services support (Systems NT, UX, Backups, DB’s or Network management), operations monitoring and end user support. 
  • Good understanding of ITSM/ITIL processes
  • Knowledge across multiple domains including web applications, database technologies, server applications, storage applications, hardware engineering, business intelligence, test/QA engineering, and deployment operations
  • Knowledge in security engineering, security threat analysis
  • Knowledge of major security protocols and frameworks including PKI, SAML, OAuth, TLS, IPSec, VPN

5. BS in Information Systems with 6 years of Experience

  • Experience with log aggregation, parsing, analysis, and monitoring to detect and alert on threat activities
  • Experience with security products such as endpoint security, vulnerability scanners, and security appliances
  • Experience with Internet protocols, e.g., TCP/IP, UDP, DNS, SMTP, ICMP, etc.
  • Change management experience and Enterprise infrastructure experience
  • Excellent project management, written and oral communication skills
  • Knowledge of Sarbanes Oxley, ISO 27001, and PCI Data Security Standards, experience in how they apply to enterprise systems, and process of validation through external audits
  • Able to remain in a stationary position for extended periods
  • Able to operate a computer and other office equipment
  • Able to identify, assess and observe details
  • Experience in IT security and defensive technologies (Antivirus, Firewalls, Event Monitoring, Network and Perimeter devices, Data Loss Prevention, IDS, Web content filtering).
  • Familiar with handling and mitigating attacks related to viruses, spoofing, hoaxes, and malware
  • Familiar with emerging security threats and attack vectors, especially web application attacks
  • Knowledge of SSL/TLS, certificates and encryption methods
  • Exposure to security tools (Web application security scanning with Netsparker, Nessus and Tenable Security Center, Snort IDS, Wireshark, Data Loss Prevention software)
  • Sound understanding of OS (Unix/Linux, Windows), IPS/IDS, VPN, Firewalls, Application Security.

6. BS in Computer Engineering with 3 years of Experience

  • Familiar with security best practices
  • Familiar with networking and TCP/IP protocol
  • Experience installing, managing, and maintaining Windows and Linux operating systems
  • Familiar with various security architectures and methodologies (Defense in Depth, Kill-Chain, NIST, Critical Controls, OWASP, etc.)
  • Strong analytical and problem-solving skills
  • Strong written and verbal communication skills
  • Ability to work in a flexible manner in line with the organization’s corporate objectives and role and to be willing to undertake other duties as reasonably requested.
  • Ability to think and act creatively, championing and promoting new ideas that contribute to the aims of the organization and the department.
  • Experience implementing, supporting, or defining requirements for security tools such as WAF, SIEM, IPS, CASB, EDRExperience with AWS public cloud services and security tools
  • Understanding of Information Security principles and frameworks, data protection and regulatory compliance, including ISO27001/FCA/PRA/ICO
  • Ability to identify and implement process improvements
  • Ability to articulate technical knowledge to a non-technical audience
  • Experience in security monitoring and incident management
  • Experience of implementing/managing Information Security technical controls e.g. Data Loss Prevention, RBAC, PAM, AV, DDoS mitigation, web proxy, Vulnerability Management.
  • Experience in developing and implementing information security policies and procedures

7. BS in Software Engineering with 5 years of Experience

  • Proficient in Windows and Linux operating systems
  • Knowledge of current COTS Cybersecurity technologies
  • Knowledge of database and operating system security
  • Understanding of the latest security principles, techniques, and protocols
  • Ability to function in a fast-paced environment and effectively manage multiple tasks simultaneously, coordinating resources and ensuring scheduled goals are met
  • Excellent verbal and written communication skills
  • Ability to effectively interact with various levels of senior management
  • Ability to make decisions and resolve problems effectively – seek out information and data to evaluate, prioritize and formulate best solution or practice
  • Able to multi-task, work independently and as part of a team, share workloads, and deal with sudden shifts in project priorities
  • Experience working within a Cybersecurity Operations Center environment 
  • Experience with COTS technologies used in a Cybersecurity Engineering environment
  • Experience in Information Security with a focus on Incident Response, Security Engineering, and/or Intrusion Detection.
  • Experience working in a Security Operations Center and/or Computer Incident Response Team.
  • Solid knowledge of computer networks and common protocols including TCP/IP, UDP, DNS, FTP, SSH, SSL/TLS, HTTP, and etc.
  • Proficiency in one or more programming/scripting languages.
  • In-depth technical knowledge of Mac OS X and Linux Operating Systems.

8. BS in Digital Forensics with 2 years of Experience

  • Experience with disk and memory forensic tools.
  • Ability to analyze endpoint, network, and application logs.
  • Experience with writing and tuning of IDS signatures.
  • Demonstrated an understanding of MITRE ATT&CK, Threat Modeling, operational threat intelligence and common attack Vectors.
  • Excellent problem-solving skills combined with hands-on experience doing root cause analysis and post-incident reviews.
  • Experience using big data log collection and correlation tools for data analytics.
  • Ability to analyze malware and obfuscated code.
  • Knowledge of CVEs and recent security vulnerabilities.
  • Knowledge of web application vulnerabilities with the ability to triage/verify OWASP Top 10 issues.
  • Experience with the creation of comprehensive technical reports.
  • Ability to lead proof of concept and evaluation of new technologies and tools to improve team operations.
  • Ability to implement partial or end-to-end automations of detection and incident response workflows.
  • Excellent verbal and written communication skills.
  • Experience with security tools, such as IDS/IPS, vulnerability scanners, AV, web and email filtering, webapp firewalls and DDoS protections, host-based protections and malware analysis engines
  • Familiarity with common enterprise technologies e.g. Microsoft, Linux, VMware, Citrix
  • Solid understanding of computer networking concepts and standards, including Network device & Firewall Hardening

9. BS in Computer Information Systems with 4 years of Experience

  • Experience developing, reviewing, and responding to DLP alerts
  • Strong people and team/relationship building skills, work with cross-functional global teams
  • Knowledge and experience with Microsoft E5 security products (MDATP, MCAS, Intunes, phishing, GPO, etc.)
  • Knowledge and familiarity with networking fundamentals (TCP/IP, DNS, Switches, Routers, RADIUS/TACACS+, etc.)
  • Knowledge and experience with security infrastructure (Firewalls, IDS/IPS, SIEM, Anti-Malware, DRM, DLP, vulnerability scanners, etc.)
  • Knowledge and familiarity with Active Directory and Azure Active Directory
  • Knowledge and experience with managing security at scale on Windows, Linux, iOS and Android-based devices
  • Ability to communicate effectively, both verbally and in writing, to a variety of audiences (immediate team, management, other business units)
  • Demonstrated experience in Information Security with focus on Incident Response, Security Engineering, and/or Intrusion Detection.
  • Experience working in a Security Operations Center and/or Computer Incident Response Team.
  • Proven knowledge of computer networks and common protocols including TCP/IP, UDP, DNS, FTP, SSH, SSL/TLS, HTTP, and etc.
  • Proficiency in one or more programming/scripting languages

10. BS in Data Science with 3 years of Experience

  • Technical knowledge of Mac OS X and Linux Operating Systems.
  • Experience with disk and memory forensic tools
  • Ability to analyze endpoint, network, and application logs.
  • Experience with writing and tuning of IDS signatures.
  • Demonstrated an understanding of MITRE ATT&CK,Threat Modeling, operational threat intelligence and common attack Vectors.
  • Excellent problem-solving skills combined with hands-on experience doing root cause analysis and post-incident reviews.
  • Experience using big data log collection and correlation tools for data analytics.
  • Ability to analyze malware and obfuscated code
  • Knowledge of CVEs and recent security vulnerabilities.
  • Knowledge of web application vulnerabilities with the ability to triage/verify OWASP Top 10 issues.
  • Experience with the creation of comprehensive technical reports.
  • Excellent verbal and written communication skills.
  • Demonstrated ability to work in a team environment.
  • Highly motivated individual and an enthusiastic learner.

11. BA in Information Security Management with 4 years of Experience

  • Ability to prioritize and execute tasks in a high-pressure environment and take direct instruction during an emergency
  • In-depth experience with SIEM, Endpoint Protection, Data Loss Prevention, Intrusion Detection and Cloud Security
  • Experience in the management of security vendors and budgets
  • Ability to prioritize and treat technical
  • Experience in supporting SOC, ISO, PCI, and HITRUST certification and compliance
  • Experience in vulnerability management programs and patch
  • Able to provide technical and professional leadership, guidance, and training to
  • Ability to build relationships and communicate effectively with peers across all business functions
  • Experience with access management
  • Experience with security management
  • CompTIA Cybersecurity Analyst Certification
  • Strong verbal and written communication skills, fluent in English..
  • Experience performing cybersecurity analyst duties in a SOC environment, including root cause analysis.
  • Knowledge of various security methodologies and processes, and technical security solutions (firewall, proxy, intrusion detection systems).

12. BA in Cybersecurity Policy with 3 years of Experience

  • Solid Understanding of TCP/IP, the OSI Model, and underlying Protocols.
  • Experience with Security Information and Event Management (SIEM) tools. 
  • Experience with Splunk and Arcsight 
  • Splunk searching and/or regular expression creation experience to support dynamic security event analysis.
  • Scripting language skills in Python or PowerShell
  • Have Information Security Certifications commensurate with experience, i.e. GCIH, SEC+, Network+, GCIA, GSEC.
  • Ability to present findings in a structured format
  • Knowledge of cloud-hosted environments such as Amazon AWS
  • Good time management and organizational skills
  • Ability to organize and manage multiple priorities
  • Ability to consistently be at work, to arrive on time, to follow instructions, to respond to management direction and solicit feedback to improve performance
  • Problem analysis and problem resolution at both a strategic and functional level
  • Ability to improve and promote quality and demonstrate accuracy and thoroughness
  • Ability to strive to research, evaluate, and implement best practices
  • Strong track record for analyzing complex problems/issues, identifying patterns, and recommending creative solutions

13. BA in Computer Science with 2 years of Experience

  • Ability and interest to learn and acquire new skills.
  • Good verbal & written communication skills
  • Good understanding of Application, networking, and operating systems concepts.
  • Experience working in Information Security or in IT Operations, Software and Application testing.
  • Experience of working in a Security operations center.
  • Experience in handling the first level of security alerts and incidents.
  • Experience in working or Knowledge of technologies like Firewall, IDS/IPS AV, ETDR and SIEM.3-5 years of experience in Information Security and/or related technology field
  • Broad knowledge of information security technologies, techniques, and processes
  • Experience identifying threats, vulnerabilities, and exploitations
  • Excellent Time management/ organization,
  • Strong communications both written and verba,l with the ability to present control topics do a broad audience
  • Information Security experience with an understanding of information security concepts/ principles, Computer/ Cyber networking awareness with an understanding of collaboration spaces
  • Strong problem-solving with demonstrated proactive correction capabilities
  • Understanding of industry-leading Data Loss Prevention Technologies

14. BA in Information Systems Management with 5 years of Experience

  • Ability to navigate and collaborate effectively within a geographically complex and dispersed global corporation
  • Ability to conduct ongoing review of existing DLP business rules/ processes, make recommendations for enhancements, and build automation processes to facilitate incident response and incident remediation
  • Cloud security understanding with knowledge of CASB and DRM solutions
  • Knowledge of Web proxy management
  • Knowledge of Systems integration and distributed systems development.
  • Knowledge of Service Oriented Architecture/Web Services.
  • Knowledge of Unix/Linux system administration.
  • Knowledge of Application and Web Servers such as IIS, Apache, WebLogic, Tomcat, and JBOSS.
  • Knowledge of Directory Services such as LDAP and Active Directory, and integration of Directory Services with Identity Management tools.
  • Knowledge of Single Sign On, Identity Federation, Role Based Access Control concepts.
  • Knowledge of Advanced authentication concepts like multi-factor, risk-based, and adaptive authentication.
  • Knowledge of Java Development skills
  • Ability to analyze host and network-based logs to find malicious activity.

15. BA in Digital Forensics with 4 years of Experience

  • Ability to consume technical threat intelligence reports and follow up with analytic development.
  • Good understanding of Operating systems (Linux and Windows) and/or network devices such as security appliances (firewalls, IDS, email security).
  • Some experience with using SIEM tools.
  • Good experience in any coding language, Python
  • General understanding of intrusion analysis or incident response or penetration testing.
  • Excellent stakeholder management.
  • Ability to work and thrive in a fast-paced team environment.
  • Ability to communicate in both English and Chinese (Mandarin).
  • Ability to identify and distill cases of interest for situation awareness updates.
  • Ability to interpret and report analytic performance metrics for management updates
  • Excellent communication skills (written & verbal)
  • Solid knowledge of MS Office Tools, specifically MS Excel and eForms
  • Ability to summarise problems or explain in alternative ways
  • Ability to communicate with stakeholders of all levels

16. BA in Computer Engineering with 3 years of Experience

  • Understanding of the NIST Cyber Security Framework
  • Understanding of cloud security principles, hands-on experience with Azure Security Centre and AWS Guard Duty is also beneficial
  • Experience operating enterprise penetration testing programmes, scoping penetration tests and building remediation plans
  • Knowledge of Oracle Data Warehouse, EBS, Excel, Access, Visio, SQL, R, Splunk, ODM, Dynatrace
  • Knowledge of Splunk Tableau, PL/SQL, PowerPoint, RapidMiner, HP ALM, and SharePoint
  • Experience with the MoneyGram application
  • Knowledge of ServiceWorks, Mainframe, Profile Editor.
  • Knowledge of All POEs (DeltaWorks, AgentWorks, PowerTransact, AgentConnect).
  • Outstanding analytical skills and ability to synthesize situations for corresponding solutions.
  • Ability to communicate with technical teams in a clear, concise format.
  • Strong organizational and time management skills.
  • Ability to explain complex technical matters to less-technical stakeholders, use layman's language
  • Ability to help manage multiple projects and multiple engagements simultaneously
  • Knowledge of operating a client-server-database system, including the ability to operate at the command line interface (CLI) level such as Windows or Linux OS
  • Knowledge and ability to operate and develop SQL queries
  • Strong knowledge of MS Office Applications including macro-programming level

17. BS in Mathematics with 5 years of Experience

  • Knowledge in Endpoint, EDR, AV
  • Knowledge in SIEMs management
  • knowledge in Cloud (Amazon, GCP or Azure), Python and DevSecOps (Sast, Dast)
  • Knowledge relating to I/T infrastructures and having in-depth and up-to-date experience with multiple operating systems and desk-side integration.
  • Strong understanding of proxy analysis.
  • Able to read proxy logs.Strong logical/critical thinking abilities, especially in analyzing network traffic and IDS events for malicious intent.
  • Proficiency in cyber threat exploitation patterns, from discovery through establishing a persistent presence.
  • Experience working in a Security Operations Center or Network Operations Center environment.
  • Knowledge of Control Frameworks and Risk Management techniques.
  • Experience with various network defense toolsets.
  • Understanding of command line scripting and implementation.
  • Ability to write new content/searches/scripts.
  • Familiarity with Splunk Enterprise Security.Strong understanding of networking.
  • Ability to perform netflow / packet capture analysis.
  • Experience with cyber threat hunting.
  • Ability to lead people and get results through others
  • Excellent oral (including presentations), written, interpersonal (active listening), skills and ability in negotiating and influencing

18. BS in Electrical Engineering with 4 years of Experience

  • Experience in integrating with external systems and software components.
  • Knowledge and skills in the fields of incident response, digital forensics and various malware analysis tools.
  • Good written and oral English and Chinese skills.
  • Broad interest and experience in chemicals research, industrial processes and materials
  • Expertise in modern web architectures (web applications, web services, development languages, container concepts, cloud solutions, security concepts)
  • Overall experience with software architecture including application front-end, backend, middleware, database (relational, non-relational, graph databases).
  • Familiar with Research and Development work in the chemical industry
  • Experience with CrowdStrike Falcon, Azure Active Directory, Azure Identity Protection, Microsoft Cloud App Security, Microsoft Defender for Identity, Proofpoint Targeted Attack Protection and Threat Response Auto Pull
  • Experience with SIEM, including writing queries, threat hunting, etc.
  • Ability to perform security tool administration, providing risk analysis including Vulnerability scanners, Security event logging & monitoring analyzers, Intrusion Detection/Prevention System (IDS/IPS) and firewall logs
  • Ability to perform system and network security audits, Anti-virus products and central console, Single SignOn Architectures (SSO)
  • Basic to intermediate knowledge of message hygiene, anti-spam/anti-malware/anti-virus for messaging systems
  • Experience with SEIMs and Log Management, syslog analysis, HTTP and TCP/IP analysis, and vulnerability assessment to include
  • Good working knowledge of Public/Private Key Infrastructure and the management of digital certificates
  • Basic to intermediate knowledge of the Endpoint Protection solution in an enterprise environment
  • General knowledge of AIX UNIX, Linux and Windows Operating Systems with a focus on security administration.

19. BS in Management Information Systems (MIS) with 3 years of Experience

  • Excellent oral and written communication skills.
  • Ability to work with the team in a customer environment.
  • Proven knowledge of security fundamentals across Microsoft platforms (Client, Server, Cloud).
  • Experience deploying advanced Windows client security technologies.
  • Proven and advanced scripting experience with PowerShell.
  • Working knowledge of Azure cloud services.
  • Strong familiarity with Office 365 migration and management.
  • Advanced understanding of Windows authentication mechanisms and supporting technologies such as ADFS.
  • Experience with understanding and troubleshooting Hybrid Identity, Including Active Directory, Azure AD and technologies such as Azure AD Connect, Azure AD Password Protection.
  • Knowledge of Cybersecurity centred on understanding Identity such as Azure AD Logging, Risk Events, Multi Factor Authentication, Defender for Identity, Privileged Identity Management (PIM), Defender for Azure (formerly), etc.
  • General security knowledge of common attack vectors and tools such as Pass the Hash, Golden Ticket and ransomware.
  • Ability to conduct internal audits and write associated audit reports
  • In-depth knowledge of Information /security frameworks, including ISO27001/2, PCI DSS, NIST

20. BA in Business Administration with a focus on IT Security with 6 years of Experience

  • Experience in the identification of vulnerabilities, either through source code analysis, penetration testing, dynamic testing or system modelling.
  • Experience working in cyber cybersecurity role for a minimum of three years.
  • Knowledge and experience in developing threat models and identifying security weaknesses over complex systems.
  • Cloud security knowledge ideally AWS security.
  • Excellent communication skills and ability to communicate technical detail to a variety of different audiences.
  • Knowledge of Programming or secure code review skills, primarily in C
  • Experience with Remediation, mitigation and resolution of security issues, e.g., through patching
  • Experience with Cloud implementation  (AWS, Azure)
  • Communications and computer networking experience, real time operating systems
  • Experience using network security analysis/IDS tools
  • Experience analyzing PCAP data and understanding of current threats and trends present in the Information Security and Technology field.
  • Experience with different types of Malware including how to detect it, attack vectors, and vulnerabilities used.
  • Knowledge of Python or other scripting languages
  • People skills and the ability to communicate effectively with various clients along with the ability to explain and elaborate on technical details

21. BS in Applied Mathematics with 3 years of Experience

  • Knowledge and understanding of network protocols, network devices, multiple operating systems, and secure architectures.
  • Experience in the detection, response, mitigation, and/or reporting of cyber threats affecting client networks and one or more of Computer network surveillance/monitoring.
  • Experience in computer evidence seizure, computer forensic analysis, and data recovery, and/or Computer network forensics.
  • Experience in computer intrusion analysis and incident response, Intrusion detection.
  • Ability to handle stress and work well under pressure.
  • Ability to use PC, MS Office, Analytical and Critical Thinking Skills.
  • Interpersonal and People Skills with Multi-Tasking.
  • Familiarity with common Intrusion Detection Systems, virus and malware behavior, and intrusion methodologies.
  • Experience in a CIRT, SOC, or CERT environment.
  • Knowledge areas of value include malware analysis, vulnerability assessment, penetration testing, and computer forensics.
  • Experience with data visualization products such as Palantir.
  • Experience with ArcSight, NetWitness, and Remedy.

22. BS in Telecommunications with 2 years of Experience

  • Solid knowledge of information security principles and practices
  • Strong knowledge of incident response and crisis management with the ability to identify both tactical and strategic solutions using strong verbal and written communication skills
  • Cloud security knowledge and skills, securing cloud environments as well as detecting and responding to cybersecurity incidents in the cloud
  • Strong Log (network, security, access, OS, application, etc.) analysis skills and experience in relation to identifying and investigating security incidents
  • Proficiency with Linux/UNIX, Windows, and/or Mac OSX
  • Understanding of application security and dev-sec-ops
  • Coding/scripting experience (PowerShell, Python, Ruby, Java, VB Scripting etc.)
  • Malware analysis, virus exploitation and mitigation techniques experience
  • Comfortable with interfacing with other internal or external organizations regarding security policy and standards violations, security controls failures and incident response situations
  • Understanding of network, desktop and server technologies, including experience with network intrusion methods, network containment, segregation techniques and technologies such as Intrusion Detection Systems (IDS) and Intrusion Protection Systems (IPS)
  • Ability to learn and apply new concepts quickly
  • Ability to resolve problems independently and/or through a support team
  • Ability to balance and prioritize work
  • Good understanding of MITRE ATT&CK, Cyber Kill Chain and similar frameworks
  • Ability to multitask and remain productive in a service-driven and results-oriented environment
  • Strong organizational, analytical, and problem-solving skills

23. BS in Computer Networking with 4 years of Experience

  • Understanding how cyber impacts business objectives
  • Ability to understand business and technical implications
  • Knowledge of cyber threat vectors, both generally and sector-specific
  • Knowledge of current cyber threat trends and approaches
  • Architecture, topology, ports and protocols, services
  • Knowledge of emerging technologies, such as cloud, Internet of Things (IoT), data analytics / machine learning, block chain / digital currency / distributed leger technology
  • Knowledge and understanding of common cybersecurity technology tools such as firewalls, IDPS, Network access control, DDOS Mitigation, Anti-Malware, Anti-Virus, encryption and authentication
  • Knowledge of different threat actor categories (nation state, criminal, general hacker, hacktivists) and common techniques
  • Knowledge of cyber risk estimation methodology and tools
  • Strong operational focus, ability to drive topics and deliver results even under pressure and time constraints
  • Superior communication skills and the ability to manage a wide array of different stakeholders
  • Experience in cybersecurity ideally in a SOC, DFIR, or CSIRT role
  • Basic knowledge of security controls related to detection, analysis, and response (SIEM, EDR, NDR, XDR, UEBA)
  • Basic knowledge of Windows and Linux systems, Active Directory, and Cloud technologies